×

Multi-dimensional credentialing using veiled certificates

  • US 8,468,355 B2
  • Filed: 12/21/2009
  • Issued: 06/18/2013
  • Est. Priority Date: 12/19/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for creating veiled certificates, the method comprising:

  • requesting a certificate from a regulator by sending a message with a digital signature of the message signed by an owner, the message comprising the owner'"'"'s veiled certificate token, the veiled certificate token comprising an encrypted version of the owner'"'"'s identification data and the owner'"'"'s public key for the certificate, the message further comprising an identification public key, the message being encrypted using the regulator'"'"'s external public key;

    validating the certificate request by verifying the sender'"'"'s identity through validation of the digital signature using the owner'"'"'s external public key and verifying the veiled certificate token has been created properly using the identification public key;

    creating a veiled certificate by combining the veiled certificate token, identification public key, and digitally signing the veiled certificate with regulator'"'"'s private key, wherein the owner'"'"'s identification information is inaccessible from the veiled certificate, except to the certificate owner;

    requesting a certificate from a second regulator by sending a message with a digital signature of the message signed by the owner, the message comprising the owner'"'"'s veiled certificate token, the veiled certificate token comprising the owner'"'"'s identification data and the owner'"'"'s public key for the certificate, the message further comprising the identification public key, the message being encrypted using the second regulator'"'"'s external public key;

    validating the certificate request by verifying the sender'"'"'s identity through validation of the digital signature using the owner'"'"'s external public key and verifying the veiled certificate token using the identification public key; and

    creating a second veiled certificate by combining the veiled certificate token, identification public key, and digitally signing the second veiled certificate with second regulator'"'"'s private key, wherein the owner'"'"'s identification information is inaccessible from the second veiled certificate, except to the owner.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×